Identity authentication method and system

A technology of identity authentication and contact information, applied in the field of information security, can solve problems such as users cannot log in in time, and it is difficult to retrieve user names or passwords

Inactive Publication Date: 2014-03-05
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides an identity authentication method and system to solve the problem that the identity authentication method in the prior art cannot

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system
  • Identity authentication method and system
  • Identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] Such as figure 1 As shown, it is a schematic flowchart of Embodiment 1 of the identity authentication method provided by the present invention, which specifically includes the following steps:

[0024] S101. The client receives a user login information retrieval request input by the user;

[0025] S102. The client prompts the user to input fingerprint information;

[0026] S103. The client collects the fingerprint information of the user, and sends the application serial code to the server;

[0027] S104. The server receives the application serial code, and determines whether there is a matching application serial code; if yes, execute step S105; if not, execute step S106.

[0028] S105. The server returns the user login information corresponding to the application serial code to the client;

[0029] S106. The server returns identity authentication failure information to the client.

[0030] Those skilled in the art can understand that the above-mentioned user login...

Embodiment 2

[0033] Such as figure 2 As shown, it is a schematic flow diagram of Embodiment 2 of the identity authentication method provided by the present invention. The method steps described in this embodiment are to perform user registration before the steps performed in Embodiment 1 above, and specifically include the following steps:

[0034] S201. When the user registers, the client receives the user registration information input by the user, collects the user's fingerprint information, and processes the collected fingerprint information to obtain an application serial code, and the user registration information includes the user login information;

[0035] S202. The client binds the user registration information and the application serial code, and sends the bound user registration information and the application serial code to the server for storage.

[0036] In addition, the above-mentioned user registration information may include not only user login information, but also cont...

Embodiment 3

[0039] Such as image 3 As shown, it is a schematic flowchart of the third embodiment of the identity authentication method provided by the present invention. The method steps described in this embodiment are based on the above-mentioned embodiment two. When the user registers, the client receives the user registration information input by the user Afterwards, before collecting the user's fingerprint information, a step of judging whether the user has collected fingerprint information is added, which specifically includes the following steps:

[0040] S301. When the user registers, the client receives user registration information input by the user;

[0041] Wherein, the user registration information includes user name, password, and may also include contact information for receiving retrieved user login information such as email address, mobile phone number, MSN number, QQ number, WeChat account number, and Weibo account number.

[0042] S302. The client sends fingerprint qu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and system. The identity authentication method comprises the following steps: a client side receives a user login information recovery request input by a user; the client side prompts the user to input fingerprint information; the client side collects the fingerprint information of the user, processes the collected fingerprint information to obtain an application code string and sends the application code string to a server side; the server side receives the application code string and determines whether an application code string matched with the received application code string exists; if the application code string matched with the received application code string exists, user login information corresponding to the application code string is returned to the client side; if the application code string matched with the received application code string does not exist, identity authentication failure information is returned to the client side. According to the identity authentication method and system, by means of the identity authentication mode that the fingerprint information of the user is collected when the user forgets login information, the collected fingerprint information is processed to obtain the application code string, and the application code string is sent to the server side for matching, effective information can be provided for the user in time for identity authentication, and the user can conduct login in time or recover a user name or a password in time.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an identity authentication method and system. Background technique [0002] In today's rapid economic development, the role of interpersonal relationships is becoming more and more obvious, and network resources are very important to a person's success. At present, many professionals are relatively deficient in interpersonal resources. Therefore, social network software (Social Network Software, hereinafter referred to as SNS) such as WeChat, Weibo, and QQ has flourished. Popular all over the world, it has become one of the main ways for the elite to expand their relationships. [0003] After registering an account in the SNS application, you need to enter the user name and password to log in. When the user forgets the user name or password, the following methods are generally used for identity authentication to retrieve the user name or password to assist the user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G06F21/32
Inventor 姬绍东
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products